Remove Accountability Remove Encryption Remove Internet Remove Surveillance
article thumbnail

DEEP TECH NEWS: How ‘attribute-based encryption’ preserves privacy at a fined-grained level

The Last Watchdog

The ubiquity of smart surveillance systems has contributed greatly to public safety. Enter attribute-based encryption ( ABE ) an advanced type of cryptography that’s now ready for prime time. Attribute-based encryption can be utilized to do a number of things,” Wu noted. Here are my takeaways.

article thumbnail

5 pro-freedom technologies that could change the Internet

Malwarebytes

After a good start, the Internet-enabled, technological revolution we are living through has hit some bumps in the road. To celebrate Independence Day we want to draw your attention to five technologies that could improve life, liberty and the pursuit of happiness on the Internet. DNS encryption.

Internet 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Hacktivist Tillie Kottmann is reportedly among those asserting responsibility for the incident, telling Bloomberg that their act helped expose the security holes of modern-day surveillance platforms.

article thumbnail

ScarCruft surveilling North Korean defectors and human rights activists

SecureList

The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. After a conversation on social media, the actor sent a spear-phishing email to the potential victim using a stolen email account.

article thumbnail

Snowden Ten Years Later

Schneier on Security

In 2013 and 2014, I wrote extensively about new revelations regarding NSA surveillance based on the documents provided by Edward Snowden. Chatting with Snowden on an encrypted IM connection, I joked that the NSA cafeteria menu probably has code names for menu items. Transferring files electronically is what encryption is for.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

In the not too distant future, each one of us will need to give pause, on a daily basis, to duly consider how we purchase and use Internet of Things devices and services. Mirai and Reaper are examples of a new generation of IoT botnets comprised of millions of infected home routers and surveillance cams. This is coming. Talk more soon.

Internet 189
article thumbnail

United Nations data stolen from Cyber Attack

CyberSecurity Insiders

And gaining internal access of servers might allow cyber criminals to conduct long-term surveillance on their counterparts. Cybersecurity Insiders has learnt from its sources that the attack was caused because of the deceitful entry of hackers using Umoja Account of one of the employee.